[PLUG] relay testing, and a question about nmap

sendai sendai at thedustyshelf.com
Sat Apr 20 19:15:22 UTC 2002


Actually you use -O (capital letter o) to see the OS fingerprint.  For a
general scan of my own network I use:

nmap -v -v -sT -sU -O -oN logfile 192.168.*.*

This does an uber-verbose(-v -v) TCP connect(-sT) UDP(-sU) OS
fingerprinted(-O) scan of 192.168.*.* and logs it to a normal text
logfile(-oN logfile).

-----Original Message-----
From: plug-admin at lists.pdxlinux.org
[mailto:plug-admin at lists.pdxlinux.org]On Behalf Of Michael Smith
Sent: Saturday, April 20, 2002 10:33 AM
To: plug at lists.pdxlinux.org
Subject: Re: [PLUG] relay testing, and a question about nmap


Hehe... use the -o option to see what operating system you're running.

Galen Seitz wrote:

> Many of you may already be aware of this, but here's a message about how
> you can test your mail server for open relaying.
>
> In a similar vein, what are the best switches to use with nmap when
> scanning your own machines?  nmap has many options, but many of them
> seem to be oriented to hiding the scan.
>
> thanks,
> galen

--
"Ask a Soviet engineer to design a pair of shoes and he'll come up with
something
that looks like the boxes that the shoes came in; ask him to make something
that
will massacre Germans, and he turns into Thomas Fucking Edison."  --Neal
Stephenson, Cryptonomicon



_______________________________________________
PLUG mailing list
PLUG at lists.pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug





More information about the PLUG mailing list